East-tec SafeBit is the perfect electronic vault you need for your privacy. It features on-the-fly AES encryption, by creating virtual...
Showing results 1 to 20 of 4,683
Phased migration to the new facility will take 18 months.
Mexico is considering the imposition of sanctions against Google over a possible breach of data protection law.
The inspector-general of Intelligence and Security has warned that Australia's top spy agency is under no obligation to delete data it receives under mandatory data-retention legislation.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
As we look at how software will be evolving, traditional PC applications and mobile apps have some substantial differences, key among them the depth and flexibility traditional applications offer that are often an anathema to mobile users.
StaffCop Standard allows you to monitor all activities on company computers and prevent the unauthorized distribution of sensitive...
It looks like ISPs and telcos may soon be facing the prospect of filtering their customers' data once again, thanks to proposed amendments to the Counter-Terrorism and Security Bill.
One in four enterprises employs DevOps,and it's making a difference in software delivery. Data security is a concern, however.
The software giant issued 8 patches to fix security vulnerabilities in Windows, including one considered "critical" -- the most severe rating.
Ahead of the State of the Union later this month, the president's proposed laws aim to force companies to disclose hacks and breaches inside a month.
The FBI's chief says hackers responsible for Sony's data breach "got sloppy," which enabled forensics teams to unmask the culpable country.
Ford's big data and mobility experiments set the stage for positioning the automaker more as a software and systems outfit. Ford is a good example of how every company is now a technology company.
In addition to showing media files and running games from the Google Play store, the micro-console can make use of Razer's new Cortex: Stream software to stream PC games -- but at an additional cost.
The idea of virtualizing a function and then separating its management functions and them putting them under programmatic control has gotten quite a bit of attention in the market over the last year. We've heard about software defined networks, storage, and even whole data centers. Is support of only x86-based systems and their workloads enough?
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
Data including usernames, passwords, and e-mail addresses belonging to customers of China's official online train ticketing site, 12306.cn, have been leaked, according to an IT security vendor.
IT security is about more than just the hardware and software. Experts give their view on where the buck really stops.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Non-HTTPS pages provide no data security and the user should be reminded of that, argues the company. It's a big step.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)